NIU OMIS 351 Final Study Guide Quizzes 1-7

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following types of infiltration techniques does one open up to by posting sensitive personal information

B. Social engineering

5. "Html" is used to

B. create and format Web pages.

Why do you suppose Google is offering you 5 GB on Drive for free, free email, free web sites, etc.?

b. Google wants to have more places to place more ads.

When Dr. Downing holds up his left hand and his right hand, and then joins them together, what point is he trying to make?

b. If you understand your business, and also understand possible technology solutions, you can make a "match".

9. Cloud computing is not suited for situations:

b. where complex legacy systems have to be ported.

. How many BYTES can a 1 GHz 32 bit chip process per second

c. (1 Billion) * 32 / 8

When Dr. Downing demonstrated how incredibly expensive it would be for you to buy an "A" in OMIS 351, his point was that...

c. computing speed and storage capacity has progressed at a similarly incredible speed, following Moore's Law.

Less popular open source products are not likely to attract the community of users and contributors necessary to help improve these products over time. This situation reiterates the belief that _____ are a key to success.

c. network effects

. One of Facebook's key resources for competitive advantage is:

d. high switching costs.

A(n) ______ is a tool for extracting, combining, and displaying data from one or more tables, according

e. query

Cloud computing refers to:

replacing computing resources with services provided over the Internet.

1. The address one types into a Web browser is also known as a:

uniform resource locator or URL

According to Dr. Downing during class, when using the Value Chain Analysis "lens" to consider competitive/strategic advantage, the main aspects companies should be examining are...

B. How they manage to get stuff from their suppliers (inbound logistics), run their operations, and get stuff to their customers (outbound logistics)

. Which of the following factors has helped Facebook build up trust among its users

B. Mutual and reciprocal approval of friend requests

What protocol is used for exchange of mail between e-mail servers across the world?

B. SMTP

24) Matt enjoys using Amazon Instant Video. However, he is hesitant to drop his Netflix subscription because

B. Switching costs

The following image is to be used for questions 20-25. Pick the configuration where each term/word is used exactly once, in the best fit with all terms used, like shown in class:

B. TCP/IP

For Netflix, the cost to stock and ship an obscure foreign film is the same as sending out the latest Will Smith blockbuster. Because of these diminished inventory and distribution costs, Netflix can meet demand for thousands titles that are not typically found in brick-and-mortar rental stores. This is an example of:

B. Using the long tail to attract a large customer base

. How might you tell if a website you are visiting is using encrypted transmission?

B. Your browser will display a certificate when it receives an encrypted transmission

Technologies that measure and analyze human body characteristics for identification or authentication are known

B. biometrics

Operational effectiveness is usually not enough to yield sustainable competitive advantage because:

B. technology can be easily acquired.

15. Investor groups that provide funding in exchange for an ownership stake in the firm are called _____.

B. venture capital firms

25. Facebook has offered a system where Web site operators can choose to accept a user's Facebook credentials for logging in. Web site operators appreciate this feature because:

C. users can access websites without creating an account, reducing a potential barrier to customer acquisition.

A server running _____ can create smaller compartments in memory that each behave as a separate computer with its own operating system and resources.

b. virtualization software

. _____ refers to the process of combining aspects of reporting, data exploration and ad hoc queries, and

c. Business intelligence

. _____ refers to applications installed on a personal computer, typically to support tasks performed by a single user.

c. Desktop software

Which of the following statements holds true for the term click fraud

c. It refers to the generation of bogus clicks, either for financial gain or to attack rivals by draining their online ad budget.

. _____ refer to older information systems that are often incompatible with other systems, technologies,

c. Legacy systems

In the VC1 assignment, in what format were the Excel Grades page and Excel Formulas page recommended to be posted to your web page?

c. Picture

Which of the following is not usually a part of a table in a database?

c. Query

11. Business Process Automation (BPA) and Business Process Reengineering (BPR) are:

c. Significantly different means of bringing change to business processes

17. Which of the following conditions is essential for data mining to work?

c. The events in the data should reflect current and future trends.

_____ are software systems designed to support interoperable machine-to-machine interaction over a network.

c. Web services

The ___________ measures the percentage of people who clicked on an ad to arrive at a destination site.

c. click-through rate

. A(n) _____ is a search performed on Google or any other search engine

c. query

Databases organized in such a way that multiple tables are interconnected based on common keys, are referred to as _____ databases.

c. special database used to store data in OLAP reporting.

Technology experts in the area of _____ specialize in technology for competitive advantage

c. strategy

6. Over 20 percent of Google's revenues come from running ads on:

c. third-party Web sites

. Search engines use _____ to discover documents for indexing and retrieval.

c. web-crawling spiders

1. What does a fourth generation (4GL... highest level) software language do?

c.Allows the user to specify the desired outcome, and the computer handles the rest (writes/produces the

25. Which of the following is FALSE?

d) A data warehouse would probably be stored on Access in a Fortune 500 company.

One contributor to the easy way with which young entrepreneurs can have success is low-cost distribution to massive markets worldwide. This is enabled by

d. App stores

If a business person gets a great idea for a possible information technology solution to a business process problem, the first thing he/she should do is:

d. Begin progressing through the stages of the SDLC, starting with "Planning"

5. _____ refers to software for creating, maintaining, and manipulating data.

d. DBMS

19. Refer to Figure 1. Which icon is used to edit viewer permission of your Google site?

d. Icon "D"

Which of the following functions is likely to be performed by enterprise software?

d. Inventory tracking

1. What is the implementation phase in the SDLC?

d. Involves placing the system into production so users can begin to perform actual business operations

. Which of the following statements holds true for the term cache?

d. It refers to a temporary storage space used to speed computing tasks.

10. _____ refers to software that is free and where anyone to look at and potentially modify the code.

d. Open source software

_____ are third-party computers that pass traffic to and from specific addresses without revealing the

d. Proxy servers

3. _____ refers to a precise set of instructions that tell the computer hardware what to do.

d. Software

What are the implications for firms that do not have common database systems with consistent formats across their enterprise?

d. They struggle to manage their value chain efficiently.

Which of the following is NOT a good example of a way technology could improve a business process?

d. Use the most up-to-date smart phone technology.

Which of the following is the best example of matching a technology solution to a business problem?

d. Using GPS to track Huskie bus locations and giving that information to students

16. According to Dr. Downing in class, what is the information age?

d. When companies/people finally realized that information is an asset.

Systems that use data created by other systems to provide reporting and analysis for organizational decision making are called _____________systems.

d. business intelligence

. The _____ refers to a situation where ads appear alongside text the advertiser would like to avoid.

d. content adjacency problem

In online advertising, the term "impression" refers to:

d. each time an ad is shown.

8. _____ is the process of using computers to identify hidden patterns in and to build models from large data sets.

e. Data mining

12. In an Access table, the _________ view is used to 1.. Add, remove or rearrange fields 2.. Define the name, the data type and other properties of each field 3.. Designate a primary key for the table.

e. Design View

If a web site owner (Person A) pays about 60 cents per click to advertise on Google, what would be the best way listed below for a competitor (Person B) to hurt him (assuming that competitor was willing

e. Get allies (of the competitor) (Person B) to click on the owner's (Person A) ads in high volume and buy nothing.

Which of the following efforts by Google is aimed at encouraging increased smartphone access worldwide?

e. Giving the Android OS to mobile phone manufacturers for free

If Jewel uses its Point of Sale terminals, along with a Preferred Card, at the cash register to store information about individual's purchasing habits and then make strategic decisions with this information, this is an example of:

e. Information Age business practices.

A _____ is a system that provides rewards and usage incentives, typically in exchange for a method that provides a more detailed tracking and recording of consumer activity

e. loyalty program

3. Some of the radical changes brought about by new technologies include:

e. the creation of an unprecedented set of security and espionage threats.

11. Which of the following is an example of application software

a. MS Word

With regard to data, for you to make a large contribution to your organization, you could suggest which?

a. Move organizational information out of spreadsheets, into a relational DBMS, and then centralize the database.

21. Crowdsourcing tools and question-and-answer sites like _____ allow firms to reach out for expertise beyond their organizations.

a. Quora

. How is Google Glass being used in the medical profession?

a. To provide instant access to patient information b. To stream surgery for observation and commentary from experienced mentors c. To capture dictated notes and images from field EMTs to better help doctors prepare for a patient's arrival d. To monitor symptoms and post-medication reminders for patients

. Once you created the formula in Excel to calculate an OMIS 351 grade (say, in cell G2), what is the fastest/easiest and correct way to apply that same formula to all of the students on the sheet?

a. Use mouse to get black cross in lower right of G2, lets you auto-fill by dragging.

After completing the Sales Order (Step #2 in the SAP Document Flow Instructions Word document), what is a good way to verify you've done it (you should be able to answer this whether you chose Option 1 or Option 2 for VC3)?

a. View the Document Flow by going to "Logistics-> Sales and Distribution -> Sales -> Order - > Display

_____ allow(s) a server to run what amounts to a copy of a PC—OS, applications, and all— and simply deliver an image of what's executing to the remote device.

a. Virtual desktops

. One skill potential business managers should practice, in order to better understand business process improvement, is..

a. drawing, diagramming or visualizing business processes

24. E-discovery refers to:

a. identifying and retrieving relevant electronic information to support litigation efforts.

Android is a software product developed by Google that allows cell phone manufacturers to control hardware and establishes standards for developing and executing applications on its platform. Android is thus an example of a(n) _____.

a. operating system

The ability to track customers, analyze campaign results, and modify tactics are the distinct advantages offered by _____ to the field of marketing.

a. the Web

A table in Access must have a primary key to

a. uniquely identify records and form relationships with other tables.

15. Technology experts in the area of user-interface design:

a. work to make sure systems are intuitive and easy to use.

. _____ allows users to pay for goods, store gift cards, and redeem coupons using their mobile phones.

b. Android Pay

6. _____ is a class of computer software that seeks to reproduce or mimic human thought, decision

b. Artificial intelligence

For VC4, how did you get the data on the web page into Access?

b. Copy/paste into Excel then import into Access.

8. Advertisers pay ad partners for _______________ whenever a user responds to an ad by performing a specified activity such as signing up for a service, requesting material, or making a purchase.

b. Cost-per-action ads

1. Which of the four tabs in Access is used to build and "ask" questions (queries) about the data?

b. Create

11. Dr. Downing received two of the same letters from the Northwestern Alumni Association on the same

b. Dr. Downing has both undergraduate and graduate degrees from Northwestern, so he might be duplicated in the system

Which of the following statements holds true for search engine optimization (SEO)?

b. It refers to the process of improving a page's organic search results.

. _____ is the process of creating a series of bogus Web sites, all linking back to the pages one is trying to promote

b. Link fraud

_____________ occurs by repeatedly searching keywords linked to rival ads, and not clicking on those

b. Rank-based impression fraud

Which of the following is one of the characteristics of using software as a service model?

b. Scalable systems

Most transactional databases are not set up to be simultaneously accessed for reporting and analysis. As a consequence:

b. data is not efficiently transformed into information.

1 _____ = 1 billion bytes

b. gigabyte

2. Data becomes _____ when it is presented in a context so that it can answer a question or support decision

b. information

A company uses radio frequency identification (RFID) tags to keep track of its inventory. This is an example of the impact of technology in the area of _____.

b. operations

1. Google's stated mission is to:

b. organize the world's information and make it universally accessible and useful.

Which of the following is not considered an advantage of Hadoop

b. relational structure.

The guy who "invented" sliced bread helps show us...

b. that we can match technology to business problems

Zara's use of RFID tags can be considered an example of

b. the IoT

9. If there are 80 million power drills in the U.S., used for an average of 13 minutes each per year, a good Sharing Economy / Collaborative Consumption business idea would be...

) an app or site that allowed multiple users in close proximity to "check out" and return a single drill.

Which of the following is true of SAP (best answer)?

. A database sits at the center of a company's SAP system

14) Which of the following is NOT an example of creating an imitation-resistant value chain?

. Apple purchasing third-party ERP software to streamline information handling

. _____ technology is a broadband technology that can use the wires of a local telephone network.

. Digital Subscriber Line (DSL)

23. _____ is the biggest photo-sharing site on the Web, taking in around three billion photos each month.

. Facebook

Tech impact is reaching even beyond the confines of Earth itself. According to an example in your chapter, how was a tool on the International Space Station recently acquired?:

. It was printed on-demand using 3D printing technology.

. _____ is the primary technology that enables Google Wallet to make wireless payments with the wave

. NFC or Near Field Communication

_____ is a method of querying and reporting that takes data from standard relational databases, calculates and summarizes the data, and then stores the data in a special database called a data cube.

. Online analytical processing

. The Web site displayed when a user clicks on an ad is called the:

. landing page.

By going public, Netflix encountered stiff competition from firms such as Wal-Mart and Blockbuster. What aspect of Netflix going public lured these firms into the market?

A. Financial disclosure laws revealed the profitability of Netflix's business model.

. What is crowdsourcing?

A. It is the act of taking a job traditionally performed by a designated agent and outsourcing it to an undefined generally large group of people in the form of an open call.

8. Which of the following statements is true of the term "cloud"?

A. It refers to a collection of computing resources available for access over the Internet.

25) Uber and PayPal used similar strategies when trying to jumpstart network effects that were vital in creating their dominance. What did each do?

A. Leveraged viral customer promotions by giving incentives to consumers who helped recruit friends to the servcie.

Which of the following are considered sources of information that can potentially be used by social engineers?

A. LinkedIn B. Corporate directories C. Social media posts D. Contests or surveys

20. For years, which of the following is the only major media category that has seen an increase in spending?

A. Online advertising

10) _____ are critical for capturing sales data, and are usually linked to inventory systems to subtract out any sold items.

A. Point-of-sale systems

Which of the following is NOT one of the Seven Lenses to Evaluate Strategic Business Options?

A. SDLC

The hypertext transfer protocol (http) defines the communication between:

A. Web browsers and Web servers.

3. Marketers can leverage social media channels for:

A. competitive intelligence. B. generating customer input. C. disseminating information. D. reinforcing a customer's relationship with the firm

16) Big firms fail to see disruptive innovations as a threat because:

A. they primarily focus on the bottom line.

21) Dell, previously the world's number one PC manufacturer, has seen its market share shrink because of rivals copying its value chain and reducing the price advantage it enjoyed over rivals. Dell's present struggles:

A. underscore the importance of continually assessing a firm's strategic position among changing market conditions.

How did Dr. Downing improve the organic search results for his Kirk Herbstreit joke in fall 2012 (How would anyone improve such results)?

By linking text like "NIU BCS Kirk Herbstreit joke" to ChuckDowning.com from webpages.

5. If Dr. Downing went onto RateMyProfessor.com and rated himself as "Hot", he would be guilty of:

C. Astroturfing.

. Which of the following is NOT one of the three factors responsible for the explosion of the Internet

C. Circuit switching

Which of the following is NOT an advantage that Virtual Private Networks (VPNs) have over dedicated-line Wide

C. Individuals outside of the company without access to the internet can access company information

24. What is the likely implication of a large and active wiki community?

C. It becomes more likely that content is up-to-date and errors are quickly corrected

13. Which of the following statements holds true of network effects?

C. It refers to a situation when the value of a product or service increases as the number of its users expands.

17. Which of the following statements holds true for the term encryption?

C. It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.

18. If Verizon promised me an all-digital network, I would know that...

C. My communications would be done in 1s and 0s and I would be at least at 2G

Which of the following is an example of Web 1.0?

C. Online Schedule for OMIS 351

Microsoft generates more revenue from the sale of games for its Xbox 360 than it does from the sale of the Xbox 360 itself. Consequently, when Matt bought a new notebook PC last semester, he was given a free Xbox 360 with his purchase. Microsoft's primary strategy in this example is:

C. Seeding the market: Microsoft is trying to create demand in a two-sided market

1)_____ refers to performing different tasks than rivals or the same tasks in a different way.

C. Strategic positioning

16. Which of the following is FALSE with regard to peer collaboration, production, and the Sharing Economy?

C. Twitter is one of the largest photo-sharing apps in the world.

A value chain is a set of:

C. activities through which a product or service is created and delivered to customers.

20) American Express, a credit card firm, provides services to consumers that include plastic cards, individual accounts, and phone-based customer service. It also provides merchants with services, such as terminals for authorizing transactions and procedures for submitting charges. Based on the above facts, American Express is said to be in a _____ market.

C. two-sided

. Which of the following statements is true about Airbnb's revenue model?

D. Airbnb charges both property owners and guests as part of transactions on their website.

13) Why would worker shifts be more efficient at FreshDirect than traditional grocery stores?

D. Because FreshDirect can aggregate customers' orders and smooth out the demand for labor.

16. Which of the following statements is consistent with realities regarding information security?

D. Law-enforcement agencies struggle to hire, train, and retain staff capable of keeping pace with today's cybercriminals.

7. A firm that provides hardware and services to run Web sites of others is known as a(n) _____.

D. Web hosting service

6. The term wiki refers to a(n):

D. Web site that can be modified by permitted users, from directly within a Web browser.

The term "content adjacency" refers to:

D. a concern that an advertisement will run near offensive material, embarrassing an advertiser and/or degrading their products or brands.

Apple's dominance of smartphone and tablet markets has allowed the firm to lock up 60 percent of the world's supply of advanced touch-screen displays, and to do so with better pricing than would be available to smaller rivals. This is an example of:

D. a growing firm gaining bargaining power with its suppliers or buyers.

Airbnb doesn't charge transactions for the three years after it enters a market, so as to generate twosided network effects of property rents and guests searching for properties to stay in

D. content delivery networks.

) Even if Netflix gave Cinematch away to its rivals, they would still not be able to make the same kind of accurate recommendations as Netflix. This is because of Netflix's _____.

D. data advantage

21. One of Facebook's key resources for competitive advantage is:

D. high switching costs.

9) Price transparency and information asymmetry have the following effects:

D. price transparency increases buyer bargaining power and information asymmetry decreases buyer bargaining power

The term operations is used to represent:

D. the organizational activities that are required to produce goods or services.

12. _____ refer to a promotion technique popular with social media that attempts to get consumers to interact with an ad, and then shares that action with friends.

E. Engagement ads

14. Which of the following statements is true about Facebook?

E. Facebook is highly profitable, with a growing ad business on mobile platforms.

The most dominant standard for 4G technology worldwide

E. LTE

Zara's IT expenditure is low by fashion industry standards and is also highly effective. Which of the following makes this possible?

E. Targeting technology investment at points in the value chain where it has the most significant impact..

. Why would a digital cellular network be better than an analog cellular network?

E. The 1's and 0's allow for multiple calls on one frequency (multiplexing) making it cheaper, as well as

4. Which of the following statements holds true for Wikis?

E. Their key use is to collaborate on common tasks or to create a common knowledge base.

11. The bulk of Facebook's revenue comes from:

E. advertising.

Popular sites like Google and Yahoo! have several computers assigned to their host names because

E. it ensures that the load of requests to their sites do not overwhelm a single computer.

4) Staying power refers to the:

E. long term viability of a product or service.

The domain name service (DNS) is a distributed database that allows users to communicate with other computers

E. mapping host and domain names to IP addresses of computers.

2. Mark Zuckerberg, the founder of Facebook, ensured that he remained in control of the firm even after it went public by:

E. retaining a majority of voting rights in the public company.

17) Network effects occur when:

E. the value of a product or service increases as its number of users expands.

22. How are News Feeds a source of value for users on Facebook?

It fosters the virality of information sharing vital to delivering value from the social graph.

17. __________ refers to generating fake followers, likes, +1s, retweets, shares, or YouTube views.

Social influence fraud

Which of the following statements holds true for the term server farm?

a. It refers to a massive network of computer servers running software to coordinate their collective use.

_____ are served by ad networks or other customer profiling firms to identify users and record behavior across multiple Web sites.

Third-party cookies

What was the main point of VC3, whether you chose Option 1 or Option 2?

To get you, the business leaders of tomorrow, looking at and thinking about SAP, the world's leading business software, so you are better prepared for your careers

20. Which of the following is FALSE when thinking about matching business process problems and technology solutions, as described in Unit 1?

a) If your technology solution involves programming or building a system, you need to enroll in a training course to obtain that skill.

23) Which of these examples best illustrates the "5 Forces" lens?

a) Using a Loyalty Card to encourage customers to return frequently ("Lock in"... reduce customer power).

19) Which of these examples best illustrates the "Value Chain Analysis" lens?

a) Using a web site to share inventory status with both customers and suppliers.

16. Which of the following is essential to data mining?

a. A computer program that automates the process

15. _____ refer to databases focused on addressing the concerns of a specific problem or business unit.

a. Data marts

_____ is a set of standards for exchanging messages containing formatted data between computer applications.

a. EDI

18. Refer to Figure VC1. Which icon is used to edit the current page while in Google sites?

a. Icon "A"

Which of the following is NOT a benefit of using Excel and web pages, as done in VC1?

a. If you want to drop the lowest value (like a Quiz) in a range, and get the average of the remaining values, use =AVERAGE(<range>,-1)

Which of the following is THE major theme of OMIS 351 this semester

a. Information Technology should be used to serve the goals of the business


Conjuntos de estudio relacionados

Weekend 5: Ancient Egypt, Day 1: Political History

View Set

HSK-1 Lesson 3 What's your name ? 第三课 你叫什么名字?

View Set

INDIABIX - TNP_Pinoybix Section 4-5

View Set

Investment Vehicle Characteristics

View Set

the executive department and the office of the governor of texas (chapter 4)

View Set

Ch. 49- Drugs Affecting Corticosteroid Levels [fludrocortiSONE]

View Set

Contract Musts, Express and Implied Contracts, Bilateral and Unilateral Contracts

View Set

*U.S. History* Chapter 20-21 Test

View Set